2019-05-16T16:17:00Z

What is your primary use case for Symantec Data Center Security?

Miriam Tover - PeerSpot reviewer
  • 0
  • 21
PeerSpot user
7

7 Answers

Shahram Dehghani - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-10-27T11:36:57Z
Oct 27, 2023

One key use case for data center security is protecting files within the data center. This is especially important for Linux systems, where locking down specific files is essential to prevent unauthorized manipulation.

Search for a product comparison
Atul-Vats - PeerSpot reviewer
Real User
Top 5
2022-11-10T16:03:00Z
Nov 10, 2022

We deployed the solution for a client for both Windows and non-Windows servers. They didn't want to have a complete prevention feature. They were using it for any anomaly detection on the critical host and for complete system lockdowns for a few of the database servers.

SM
Real User
2021-04-15T11:39:52Z
Apr 15, 2021

We use Symantec Data Center Security for SEP — Symantec Endpoint Protection.

CY
Real User
2020-10-22T08:45:22Z
Oct 22, 2020

Our primary use case of this solution was for checking some program file changes. We are customers of Symantec and I'm an IT security specialist.

it_user1204914 - PeerSpot reviewer
Real User
2020-05-27T16:23:40Z
May 27, 2020

This product makes up part of our security solution that we offer to customers for use in data centers and remote sites. As many people are now working from home, they use this solution so that they can work remotely to their data centers and still keep operations centralized. They need to work flexibly, not only from a geolocation point of view but geographically.

PB
Real User
2020-01-26T09:26:00Z
Jan 26, 2020

Symantec Data Center Security is part of our overall security solution that includes anti-virus, anti-spam, and anti-malware protection.

Learn what your peers think about Symantec Data Center Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,319 professionals have used our research since 2012.
MD
Real User
2019-05-16T16:17:00Z
May 16, 2019

We have a public zone that is a mix of intranet and public service. We have to ensure that none of the hosts are compromised and that nothing impacts the integrity of the servers. This is our primary use case. Next, we have to protect data that is stored inside of Docker containers. In developing features, they are outside to an extent, so these have to be brought up in a secured form. This means that we had to create split architectures. Also, we needed something that allowed us to integrate the identity mapping and ensure a certificate-based review. The advantage in the field is that they have a template and a certificate broker. The broker wraps the application around that certificate, which can be put into the firewall security policy. For example, if one of the programmers comes out with a new code review, which is not wrapped on our stack, then I will not allow him to put that into the code. It first has to be checked into the repository, signed, and then put back into the system. The advantage to this is that the integrity of the person who created it, and the person who modifies it, are all approved as part of the audit entry. Because it is worked on by a lot of people, and there are millions of lines of code that are changed using this mechanism, we need to know who made what change. The code review team is integrating, but they have to rely on the integrity of the system. So, the snapshot mechanism and the ability to integrate that along with the Docker capabilities is something that is very important to us. We have also used the Firewall and IPS components, as well as the capability for monitoring the integrity of files.

Docker containers make it easy to develop, deploy, and deliver applications where containers can be deployed and brought down in a matter of seconds. This flexibility makes it very useful for DevOps to automate deployment of containers. Symantec Data Center Security: Server Advanced provides agentless Docker container protection that allows you to achieve the performance benefits of Docker without sacrificing security. Full application control enables administrator privilege de-escalation,...
Download Symantec Data Center Security ReportRead more